Sciweavers

557 search results - page 105 / 112
» Two experiences designing for effective security
Sort
View
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
16 years 2 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
DIGITALCITIES
2003
Springer
15 years 7 months ago
Activities and Technologies in Digital City Kyoto
We have developed a digital city for Kyoto, the old capital and cultural center of Japan, as a social information infrastructure for urban everyday life including shopping, busines...
Toru Ishida
CIDR
2009
140views Algorithms» more  CIDR 2009»
15 years 2 months ago
Energy Efficiency: The New Holy Grail of Data Management Systems Research
Energy costs are quickly rising in large-scale data centers and are soon projected to overtake the cost of hardware. As a result, data center operators have recently started turni...
Stavros Harizopoulos, Mehul A. Shah, Justin Meza, ...
122
Voted
CORR
2010
Springer
168views Education» more  CORR 2010»
15 years 4 days ago
Adding HL7 version 3 data types to PostgreSQL
The HL7 standard is widely used to exchange medical information electronically. As a part of the standard, HL7 defines scalar communication data types like physical quantity, poin...
Yeb Havinga, Willem Dijkstra, Ander de Keijzer
ASPLOS
2009
ACM
16 years 2 months ago
Producing wrong data without doing anything obviously wrong!
This paper presents a surprising result: changing a seemingly innocuous aspect of an experimental setup can cause a systems researcher to draw wrong conclusions from an experiment...
Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Pe...